]>
Commit | Line | Data |
---|---|---|
453dfd8d EK |
1 | [ssltest_default] |
2 | ||
3 | [ssltest_good] | |
9f48bbac EK |
4 | client = ssltest_good_client_extra |
5 | server = ssltest_good_server_extra | |
6 | resume-server2 = ssltest_good_resume_server2_extra | |
da085d27 | 7 | resume-client = ssltest_good_resume_client_extra |
9f48bbac EK |
8 | |
9 | Method = DTLS | |
10 | HandshakeMode = Resume | |
e0421bd8 | 11 | ApplicationData = 1024 |
6dc99745 | 12 | MaxFragmentSize = 2048 |
9f48bbac | 13 | |
453dfd8d | 14 | ExpectedResult = ServerFail |
9f48bbac EK |
15 | ExpectedClientAlert = UnknownCA |
16 | ExpectedProtocol = TLSv1.1 | |
d2b23cd2 | 17 | ExpectedServerName = server2 |
5c753de6 | 18 | SessionTicketExpected = Yes |
9f48bbac EK |
19 | ResumptionExpected = Yes |
20 | ||
21 | [ssltest_good_client_extra] | |
22 | VerifyCallback = RejectAll | |
23 | ServerName = server2 | |
24 | NPNProtocols = foo,bar | |
25 | ||
da085d27 EK |
26 | [ssltest_good_resume_client_extra] |
27 | CTValidation = Strict | |
28 | ||
9f48bbac EK |
29 | [ssltest_good_server_extra] |
30 | ServerNameCallback = IgnoreMismatch | |
31 | BrokenSessionTicket = Yes | |
32 | ||
33 | [ssltest_good_resume_server2_extra] | |
34 | ALPNProtocols = baz | |
453dfd8d EK |
35 | |
36 | [ssltest_unknown_option] | |
37 | UnknownOption = Foo | |
38 | ||
6bd3379a EK |
39 | [ssltest_wrong_section] |
40 | server = ssltest_wrong_section_server | |
41 | ||
42 | [ssltest_wrong_section_server] | |
43 | VerifyCallback = RejectAll | |
44 | ||
453dfd8d EK |
45 | [ssltest_unknown_expected_result] |
46 | ExpectedResult = Foo | |
47 | ||
48 | [ssltest_unknown_alert] | |
6bd3379a | 49 | ExpectedServerAlert = Foo |
453dfd8d EK |
50 | |
51 | [ssltest_unknown_protocol] | |
52 | Protocol = Foo | |
a263f320 EK |
53 | |
54 | [ssltest_unknown_verify_callback] | |
6bd3379a EK |
55 | client = ssltest_unknown_verify_callback_client |
56 | ||
57 | [ssltest_unknown_verify_callback_client] | |
58 | VerifyCallback = Foo | |
5c753de6 TS |
59 | |
60 | [ssltest_unknown_servername] | |
6bd3379a EK |
61 | client = ssltest_unknown_servername_client |
62 | ||
63 | [ssltest_unknown_servername_client] | |
5c753de6 TS |
64 | ServerName = Foo |
65 | ||
d2b23cd2 | 66 | [ssltest_unknown_servername_callback] |
6bd3379a EK |
67 | server = ssltest_unknown_servername_server |
68 | ||
69 | [ssltest_unknown_servername_server] | |
d2b23cd2 EK |
70 | ServerNameCallback = Foo |
71 | ||
5c753de6 TS |
72 | [ssltest_unknown_session_ticket_expected] |
73 | SessionTicketExpected = Foo | |
74726750 | 74 | |
439db0c9 MC |
75 | [ssltest_unknown_compression_expected] |
76 | CompressionExpected = Foo | |
77 | ||
a84e5c9a TS |
78 | [ssltest_unknown_session_id_expected] |
79 | SessionIdExpected = Foo | |
80 | ||
74726750 EK |
81 | [ssltest_unknown_method] |
82 | Method = TLS2 | |
590ed3d7 EK |
83 | |
84 | [ssltest_unknown_handshake_mode] | |
85 | HandshakeMode = Foo | |
86 | ||
87 | [ssltest_unknown_resumption_expected] | |
88 | ResumptionExpected = Foo | |
da085d27 EK |
89 | |
90 | [ssltest_unknown_ct_validation] | |
91 | client = ssltest_unknown_ct_validation_client | |
92 | ||
93 | [ssltest_unknown_ct_validation_client] | |
94 | CTCallback = Foo | |
cf72c757 F |
95 | |
96 | [ssltest_invalid_max_fragment_len] | |
97 | MaxFragmentLenExt = 421 |